• Biology can show us how to stop hackers

    “Biology is the true science of security. And by that I mean that organisms have had to contend with adversaries and competitors from the very beginning of their evolutionary history. As a result, they’ve evolved an incredible repertoire of defense systems to protect themselves,” says an expert on biology and computation. “Looking at how biological systems have learned to protect themselves can suggest novel approaches to security problems,” ASU’s Professor Stephanie Forrest says. “What I try to do is look at biological mechanisms and principles and translate those mechanisms and architectures into computational algorithms that protect computers.”

  • Russia’s pro-Trump campaign began early, aiming to help him win GOP primaries: WSJ

    The U.S. intelligence community cited December 2015 as the earliest suspected time that Russian government social media account began their broad campaign in support of Donald Trump. A Wall Street Journal investigation reveals that the Kremlin’s campaign of support for Trump began six months earlier, in June 2015, days after he announced his candidacy. This earlier Russian disinformation campaign was aimed to help Trump defeat his Republican primary rivals. This early campaign, however, already engaged in dissemination of fake stories aiming to tarnish Hillary Clinton and undermine her campaign.

  • The challenge of authenticating real humans in a digital world

    By Jungwoo Ryoo

    There are three main ways of proving an identity. One involves something you know – like a password or your mother’s maiden name. A second method of authentication is with something you have – such as a key to your home’s front door or a smart card to swipe at work. A third way is by digitally authenticating the individual human being – who you are – with some aspect of your biology. This increasing dependence on digital authentication may actually result in less security. While cameras, sensors and other devices can make authentication easier for people to accomplish, they carry their own weaknesses. It may be more convenient, and even more secure, than a magnetic strip on a plastic card in your wallet. But the potential dangers will require much higher security for private information, particularly biometric data. A real identity still comes down to flesh and blood.

  • “Combosquatting” attacks, hiding in plain sight, trick computer users

    To guard against unknowingly visiting malicious websites, computer users have been taught to double-check website URLs before they click on a link. But attackers are now taking advantage of that practice to trick users into visiting website domains that contain familiar trademarks — but with additional words that change the destination to an attack site. The attack strategy, known as combosquatting, is a growing threat, with millions of such domains set up for malicious purposes.

  • The real risks quantum attacks will pose for Bitcoin

    Combining expertise in quantum technologies and cryptography, researchers have been projecting future dates that quantum computers could jeopardize the security of current cryptocurrencies, a market now worth over $150 billion, and assessing countermeasures to such attacks.

  • DOJ considering charging Russian government officials in DNC, Podesta hacks

    The Department of Justice has identified six Russian government officials involved in hacking the DNC and using the information against candidate Hillary Clinton during the 2016 election. Prosecutors have enough evidence to bring charges against those individuals by next year. The information gathered by DOJ supports the U.S. intelligence community’s conclusion that Russian President Vladimir Putin ordered Russian government agencies to launch a coordinated effort to help Trump win the November election. DOJ has identified Russian hackers working for both military and intelligence agencies in Russia.

  • A third of the internet is under DoS attack

    For the first time, researchers have carried out a large-scale analysis of victims of internet denial-of-service (DoS) attacks worldwide. And what they found is, in a phrase from their study, “an eye-opening statistic.” The researchers found that about one-third of the IPv4 address space was subject to some kind of DoS attacks, where a perpetrator maliciously disrupts services of a host connected to the internet. IPv4 is the fourth version of an Internet Protocol (IP) address, a numerical label assigned to each device participating in a computer network.

  • Real security requires strong encryption – even if investigators get blocked

    By Susan Landau

    The FBI and the U.S. Department of Justice have been fighting against easy, widespread public access to encryption technologies for 25 years. Since the bureau’s dispute with Apple in 2016 over access to the encrypted iPhone of one of the two people who shot 14 victims in San Bernardino, California, this battle has become more pitched. This dispute is not about whether regular people can or should use encryption: The U.S. government is in favor of using encryption to secure data. Rather, it’s about the FBI’s demand that encryption systems include “exceptional access,” enabling police who get a warrant to circumvent the encryption on a device or on an encrypted call. The demand for exceptional access by law enforcement is a broad threat to fundamental parts of American society, and it poses a serious danger to national security as well as individual privacy. As technology changes, the jobs of police and intelligence workers must also change; in some ways, it will be harder, in others, easier. But the basic need for security supports the call for wide use of strong encryption – and without modifications that make it easy for Russians, or others, to break in.

  • Challenges to U.S. election integrity

    Various concerns about the security of U.S. elections have arisen over the past two decades, some more significant than others. While many studies have shown that voter fraud, for instance, is vanishingly rare in the U.S., what about the state of electoral administration, lost votes, and cyberattacks? MIT experts offer insights on data, technology, and election security in an era of rising concern.

  • Israeli software gives New York power plants “Iron Dome” protection against failures

    An Israeli company that developed the software for Israel’s Iron Dome anti-missile system is working with the New York Power Authority to prevent unexpected shutdowns. New York State Robert Moses Niagara Power Plant, Blenheim-Gilboa Pumped-Storage Power Plant, and a 500 MW plant in Queens now have software based on the software that runs Iron Dome.

  • Russia’s disinformation posts reached 126 million Americans: Facebook

    Disinformation specialists at the Internet Research Agency (IRA), a Kremlin-affiliated Russian group, created 80,000 Facebook posts which were directly served to 29 million Americans. After the posts were liked, shared, and commented on, they traveled to the news feeds of approximately 126 million Americans at some point between January 2015 and August 2017. These numbers mean that Russian-produced disinformation and propaganda reached about 40 percent of the U.S. population. Facebook says that IRA’s 80,000 posts come on top the 3,000 political ads created by the IRA – and that these ads were seen by 11.4 million Americans. “Many of the ads and posts we’ve seen so far are deeply disturbing — seemingly intended to amplify societal divisions and pit groups of people against each other,” said Facebook’s General Counsel Colin Stretch. “They would be controversial even if they came from authentic accounts in the United States. But coming from foreign actors using fake accounts, they are simply unacceptable.”

  • Insinuation and influence: How the Kremlin targets Americans online

    By Andrew Weisburd and Bret Schafer

    The objective of Kremlin influence operations, part of a larger set of tactics and strategies known as active measures, is to make the target population more amenable to Kremlin wants and desires. They achieve this either by gaining a sympathetic hearing of their views, or failing that, by keeping us busy fighting among ourselves. The Kremlin seeks both to sow discord and create chaos in Western societies and rally support for, or limit opposition to, its geopolitical agenda.

  • WannaCry report shows NHS chiefs knew of security danger, but management took no action

    By Eerke Boiten and David S. Wall

    A report from the parliamentary National Audit Office into the WannaCry ransomware attack that brought down significant parts of Britain’s National Health Service in May 2017 has predictably been reported as blaming NHS trusts and smaller organizations within the care system for failing to ensure that appropriate computer security measures such as software updates and secure firewalls were in place. But the central NHS IT organization, NHS Digital, provided security alerts and the correct patches that would have protected vulnerable systems well before WannaCry hit. This is not a cybersecurity failure in the practicalities, but a failure of cybersecurity management at the top level.

  • “Instant replay” quickly pinpoints cyberattack details

    Until now, assessing the extent and impact of network or computer system attacks has been largely a time-consuming manual process. A new software system being developed by cybersecurity researchers will largely automate that process, allowing investigators to quickly and accurately pinpoint how intruders entered the network, what data they took, and which computer systems were compromised.

  • North Korea behind May 2017 WannaCry attack on British health services: U.K.

    The British government has said it was all but certain North Korea carried out the “WannaCry” malware attack which hobbled the IT systems of the NHS, Britain’s national health service, in May. The National Audit Office (NAO) released a report on Friday which found that hospitals and clinics were left exposed to cyberattack because they failed to follow basic cybersecurity recommendations. WannaCry attacks were not limited to the United Kingdom: More than 300,000 computers in 150 countries were also infected with the WannaCry ransomware. The malware crippled organizations — government agencies, global companies, small firms — by targeting computers with outdated security.